×

Found 1,360 Documents (Results 1–100)

Batch blind signatures on elliptic curves. (English) Zbl 1403.94099

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 192-206 (2015).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI

Some elliptic subcovers of genus 3 hyperelliptic curves. (English) Zbl 1403.14064

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 181-191 (2015).
MSC:  14H52 14G50 94A60
PDFBibTeX XMLCite
Full Text: DOI

Models of curves from GHS attack in odd characteristic. (English) Zbl 1403.94084

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 171-180 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Invalid curve attacks in a GLS setting. (English) Zbl 1398.94127

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 41-55 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Efficient ephemeral elliptic curve cryptographic keys. (English) Zbl 1397.94091

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 524-547 (2015).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

Hashing into Jacobi quartic curves. (English) Zbl 1397.94111

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 355-375 (2015).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

Lightweight coprocessor for Koblitz curves: 283-bit ECC including scalar conversion with only 4300 gates. (English) Zbl 1380.94124

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 102-122 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI Link

Algebraic-geometric codes from rational surfaces. (English) Zbl 1360.94422

Lahyane, Mustapha (ed.) et al., Algebra for secure and reliable communication modeling. Proceedings of the CIMPA research school and conference, Morelia, Mexico, October 1–13, 2012. Providence, RI: American Mathematical Society (AMS); Madrid: Real Sociedad Matemática Española (RSME) (ISBN 978-1-4704-1018-6/pbk; 978-1-4704-2566-1/ebook). Contemporary Mathematics 642, 173-180 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Vector bundles with a view toward coding theory. (English) Zbl 1360.94423

Lahyane, Mustapha (ed.) et al., Algebra for secure and reliable communication modeling. Proceedings of the CIMPA research school and conference, Morelia, Mexico, October 1–13, 2012. Providence, RI: American Mathematical Society (AMS); Madrid: Real Sociedad Matemática Española (RSME) (ISBN 978-1-4704-1018-6/pbk; 978-1-4704-2566-1/ebook). Contemporary Mathematics 642, 159-171 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Gröbner bases methods in coding theory. (English) Zbl 1360.94421

Lahyane, Mustapha (ed.) et al., Algebra for secure and reliable communication modeling. Proceedings of the CIMPA research school and conference, Morelia, Mexico, October 1–13, 2012. Providence, RI: American Mathematical Society (AMS); Madrid: Real Sociedad Matemática Española (RSME) (ISBN 978-1-4704-1018-6/pbk; 978-1-4704-2566-1/ebook). Contemporary Mathematics 642, 73-86 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Interrelation of families of points of high order on the Edwards curve over a prime field. (English. Russian original) Zbl 1396.11090

Probl. Inf. Transm. 51, No. 4, 391-397 (2015); translation from Probl. Peredachi Inf. 51, No. 4, 92-98 (2015).
MSC:  11G20 94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Smooth embeddings for the Suzuki and Ree curves. (English) Zbl 1430.14069

Ballet, Stéphane (ed.) et al., Algorithmic arithmetic, geometry, and coding theory. 14th international conference on arithmetic, geometry, cryptography, and coding theory (AGCT), CIRM, Marseille, France, June 3–7, 2013. Proceedings. Providence, RI: American Mathematical Society (AMS). Contemp. Math. 637, 251-291 (2015).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians. (English) Zbl 1365.11081

Ballet, Stéphane (ed.) et al., Algorithmic arithmetic, geometry, and coding theory. 14th international conference on arithmetic, geometry, cryptography, and coding theory (AGCT), CIRM, Marseille, France, June 3–7, 2013. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-1461-0/pbk; 978-1-4704-2339-1/ebook). Contemporary Mathematics 637, 127-141 (2015).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Four\(\mathbb {Q}\): four-dimensional decompositions on a \(\mathbb {Q}\)-curve over the Mersenne prime. (English) Zbl 1396.94070

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 214-235 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Heights of toric varieties, entropy and integration over polytopes. (English) Zbl 1376.14053

Nielsen, Frank (ed.) et al., Geometric science of information. Second international conference, GSI 2015, Palaiseau, France, October 28–30, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-25039-7/pbk; 978-3-319-25040-3/ebook). Lecture Notes in Computer Science 9389, 286-295 (2015).
MSC:  14M25 52B20 94A15
PDFBibTeX XMLCite
Full Text: DOI

Revisiting the complex multiplication method for the construction of elliptic curves. (English) Zbl 1368.11135

Daras, Nicholas J. (ed.) et al., Computation, cryptography, and network security. Cham: Springer (ISBN 978-3-319-18274-2/hbk; 978-3-319-18275-9/ebook). 299-318 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Low-resource and fast binary Edwards curves cryptography. (English) Zbl 1377.94058

Biryukov, Alex (ed.) et al., Progress in cryptology – INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6–9, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). Lecture Notes in Computer Science 9462, 347-369 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Dynamic key-aggregate cryptosystem on elliptic curves for online data sharing. (English) Zbl 1367.94337

Biryukov, Alex (ed.) et al., Progress in cryptology – INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6–9, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). Lecture Notes in Computer Science 9462, 25-44 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Parallelized software implementation of elliptic curve scalar multiplication. (English) Zbl 1403.94075

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 445-462 (2015).
PDFBibTeX XMLCite
Full Text: DOI HAL

On near prime-order elliptic curves with small embedding degrees. (English) Zbl 1465.11159

Maletti, Andreas (ed.), Algebraic informatics. 6th international conference, CAI 2015, Stuttgart, Germany, September 1–4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9270, 140-151 (2015).
PDFBibTeX XMLCite
Full Text: DOI HAL

An elliptic curve cryptographic processor using Edwards curves and the number theoretic transform. (English) Zbl 1401.94166

Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 94-102 (2015).
MSC:  94A60 14G50 68M07
PDFBibTeX XMLCite
Full Text: DOI

Isogeny volcanoes of elliptic curves and Sylow subgroups. (English) Zbl 1378.94042

Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 162-175 (2015).
MSC:  94A60 14H52
PDFBibTeX XMLCite
Full Text: DOI Link

RSA and elliptic curve least significant bit security. (English) Zbl 1378.94059

Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 146-161 (2015).
MSC:  94A60 14H52
PDFBibTeX XMLCite
Full Text: DOI

Fast implementation of Curve25519 using AVX2. (English) Zbl 1378.94040

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 329-345 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Attacking a binary GLS elliptic curve with Magma. (English) Zbl 1370.94498

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 308-326 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Improved sieving on algebraic curves. (English) Zbl 1370.94548

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 295-307 (2015).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI HAL

Twisted Hessian curves. (English) Zbl 1370.94487

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 269-294 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI Link

Subgroup security in pairing-based cryptography. (English) Zbl 1370.94485

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 245-265 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Computing optimal 2-3 chains for pairings. (English) Zbl 1370.94493

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 225-244 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Advances on superelliptic curves and their applications. Based on the NATO Advanced Study Institute (ASI), Ohrid, Macedonia, 2014. (English) Zbl 1326.14003

NATO Science for Peace and Security Series D: Information and Communication Security 41. Amsterdam: IOS Press (ISBN 978-1-61499-519-7/hbk; 978-1-61499-520-3/ebook). xii, 375 p. (2015).
PDFBibTeX XMLCite
Full Text: arXiv Link

Discrete logarithms for torsion points on elliptic curve of embedding degree \(1\). (English) Zbl 1355.94072

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, Korea, December 3–5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 69-83 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Faster ECC over \(\mathbb {F}_{2^{521}-1}\). (English) Zbl 1345.94066

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 539-553 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Algebra for secure and reliable communication modeling. Proceedings of the CIMPA research school and conference, Morelia, Mexico, October 1–13, 2012. (English) Zbl 1320.14003

Contemporary Mathematics 642. Providence, RI: American Mathematical Society (AMS); Madrid: Real Sociedad Matemática Española (RSME) (ISBN 978-1-4704-1018-6/pbk; 978-1-4704-2566-1/ebook). xiii, 240 p. (2015).
PDFBibTeX XMLCite
Full Text: DOI

Algorithmic arithmetic, geometry, and coding theory. 14th international conference on arithmetic, geometry, cryptography, and coding theory (AGCT), CIRM, Marseille, France, June 3–7, 2013. Proceedings. (English) Zbl 1317.11007

Contemporary Mathematics 637. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-1461-0/pbk; 978-1-4704-2339-1/ebook). v, 306 p. (2015).
PDFBibTeX XMLCite
Full Text: DOI

Representation stability. (English) Zbl 1373.55006

Jang, Sun Young (ed.) et al., Proceedings of the International Congress of Mathematicians (ICM 2014), Seoul, Korea, August 13–21, 2014. Vol. II: Invited lectures. Seoul: KM Kyung Moon Sa (ISBN 978-89-6105-805-6/hbk; 978-89-6105-803-2/set). 1173-1196 (2014).
PDFBibTeX XMLCite
Full Text: arXiv

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software